The Deceptively Simple Shortcut to Visibility

The Deceptively Simple Shortcut to Visibility

If you’ve ever had a security vendor pitch their wiz-bang internal network threat prevention solution, you’ve probably thought at some point “You’re getting ahead of yourself. First we need to know what’s going on, then we can talk about active controls on the...
Deception: The Fast Track to Zero Trust Security

Deception: The Fast Track to Zero Trust Security

The Zero Trust security model is conceptually simple, but fiendishly difficult to implement at scale.  Zero Trust (ZT) simply means that we cannot trust the perimeter to keep the bad guys out, and therefore all internal network traffic must be considered malicious...
Using Deep Learning for Information Security – Part 2

Using Deep Learning for Information Security – Part 2

Authors: Santosh Kosgi, Mohammad Waseem, Arunabha Choudhury, and Satnam Singh Deep Learning-based methods have been successfully applied to various computer vision and NLP based problems recently [1]. AI researchers have achieved statistically significant improvements...
Formjacking: Deception is your cure

Formjacking: Deception is your cure

I recently saw a news article published by Symantec stating that cyber criminals are shifting their attack techniques. According to Symantec, “For the first time since 2013, ransomware infections declined, dropping by 20 percent.” Due to the sharp decline in the price...
DECEPTION: YOU KEEP USING THAT WORD…

DECEPTION: YOU KEEP USING THAT WORD…

I DO NOT THINK IT MEANS WHAT YOU THINK IT MEANS If you recognize the quote in the title of this blog entry, then you also know one of my favorite movies of all time is Princess Bride. If you didn’t recognize it, here’s a relevant reminder:...